Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Microdrivers: A New Architecture for Device Drivers., , , and . HotOS, USENIX Association, (2007)OMOS: A Framework for Secure Communication in Mashup Applications., , and . ACSAC, page 355-364. IEEE Computer Society, (2008)Retrofitting Legacy Code for Authorization Policy Enforcement., , and . IEEE Symposium on Security and Privacy, page 214-229. IEEE Computer Society, (2006)Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis., , , and . ICSE, page 458-467. IEEE Computer Society, (2007)Exploring infrastructure support for app-based services on cloud platforms., , , and . Computers & Security, (2016)A framework for the extraction of Deep Neural Networks by leveraging public data., , , , , and . CoRR, (2019)Regulating Drones in Restricted Spaces., , and . HotMobile, page 27-32. ACM, (2019)Regulating ARM TrustZone Devices in Restricted Spaces., , , , , and . MobiSys, page 413-425. ACM, (2016)Working set-based access control for network file systems., , and . SACMAT, page 207-216. ACM, (2009)HeapMD: identifying heap-based bugs using anomaly detection., and . ASPLOS, page 219-228. ACM, (2006)